• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

405 Courses delivered Online

Performance Reviews: Powerful or Pathetic?

5.0(1)

By Enspark

Performance reviews can be a powerful tool for having a successful and productive year. However, many managers and employees consider them to be ineffective, or a waste of time. In this course we'll discuss six key factors that directly impact the effectiveness of a performance review. In this course you'll learn how to turn a performance review into a strategic opportunity to connect with your employees (or your boss) to clarify goals, make course corrections, offer coaching and encouragement, and provide a vehicle for consistent performance improvement.

Performance Reviews: Powerful or Pathetic?
Delivered Online On Demand50 minutes
£14.95

55268 Microsoft Power Automate for End Users

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The intended audience for this course would be those who have been using Office 365 for some time and are now looking at optimizing their existing business processes and designing new ones. Overview #NAME? This course delivers an instructor-led product showcase for Microsoft Power Automate from start to finish in an engaging and practical way. Power Automate is a diverse product, turning business processes into automated, consistent and visual workPower Automates. Power Automate is designed to interweave the various products in Office 365 as well as connect to other on-premises and web-based solutions. This course will give you the confidence to select the right actions and workPower Automate logic for your business workPower Automates. 1 - An Introduction to Power Automate What is Microsoft Power Automate? The benefits of automation How to get to Power Automate Lab 1: Setup your tenant Setup Office 365 Download Course Files Customise your App Launcher Create accounts for colleagues After completing this module, students will be able to: Know what Microsoft Power Automate is The Benefits of using Power Automate to automate processes How to access a Power Automate 2 - Getting Started with Power Automate Using Power Automate templates Navigating in Power Automate Editing a Power Automate Publish and trigger a Power Automate Turn off or delete a Power Automate Lab 1: Building processes in Office 365 Create a Team with a channel Build an absence business process Testing the absence process Optional: Create Feedback Form Optional: Power Automate to Notify of Bad Ratings Optional: Test your Form and Power Automate After completing this module, students will be able to: How to use Power Automate tempaltes How to navigate around Power Automate How to edit Power Automates How to publish and trigger Power Automates How to turn off or delete Power Automates 3 - Power Automate Logic Adding conditions Designing switches Using apply to each Configuring do until logic Adding a scope Lab 1: Scheduling documentation reviews Setup a policy library in SharePoint Design a policy review schedule Testing the policy review process Optional: Notify if a file nears review After completing this module, students will be able to: How to add condtions in a Power Automate How to design switches for a Power Automate How to use apply to each How to configure do until logic How to add a scope 4 - Integration Standard and premium connectors Connecting to web services Using Power Automate with on-premises data Lab 1: Using Power Automate and SQL to Review Sales Create a new orders list Designing the price check process Testing the price check process Optional: Update with managers After completing this module, students will be able to: How to use Standard and Premium connectors How to connect to web services How to using Power Automate with on-premises data 5 - The Mobile App Downloading the mobile app Signing in and account management Building and managing Power Automates Creating buttons Feeds and approvals Lab 1: Optional: Using the Power Automate mobile app Setting up the Power Automate mobile app Create a new Power Automate in the mobile app Using Power Automate buttons in the app Uninstall the Power Automate mobile app After completing this module, students will be able to: How to download the mobile app How to sign into the mobile app How to build and manage Power Automates in the mobile app How to create buttons in the mobile app How to feed and use approvals in the mobile app 6 - Administration and Maintenance Maintaining a Power Automate View history and analytics Sharing a Power Automate Export and import Power Automates Office 365 administration for Power Automate Environments Data policies Data integration Lab 1: Maintaining your Power Automates Share a Power Automate with a colleague Disabling an active Power Automate Deleting a Power Automate After completing this module, students will be able to: How to maintain a Power Automate How to view history and analytics for a Power Automate How to share a Power Automate How to export and import Power Automates How to administrate a Power Automate in Office 365 How to use data policies in a Power Automate How to use data integration in a Power Automate

55268 Microsoft Power Automate for End Users
Delivered Online
£595

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered Online
£1,995

How to Conduct and Write Systematic Literature Reviews

By Research'Kraft Consulting

Workshop objectives 1-Introduction to Systematic Reviews 2- Formulating the Research Question 3- Developing a Protocol 4- Literature Search 5- Study Selection 6- Data Extraction 7- Quality Assessment: 8- Data Synthesis 9- Reporting and Publication: 10- How to write a scoping review A certificate from Research'Kraft will be given after successful completion.

How to Conduct and Write Systematic Literature Reviews
Delivered in person or OnlineFlexible Dates
£40

ILM Level 5 Qualifications in Business Coaching and Mentoring

By Dickson Training Ltd

Based on our extensive work and experience with leaders, both in the private and public sectors, this ILM Level 5 Coaching and Mentoring programme has been designed to develop the capability of leaders to positively impact the performance of individuals and teams. We are experts at unlocking peak performance. Coaching and mentoring improves relationships, performance and engagement. This programme has been created to sharpen a leader's skills - enabling them to balance control, commitment and empowerment through productive conversations with individuals and teams. Scroll down to find out more about this ILM Level 5 qualification, or use the buttons below to jump straight to the scheduled course dates and prices. All of our ILM Programmes are provided in partnership with The BCF Group, which is the ILM Approved Centre we deliver under. Course Syllabus The syllabus of the ILM Level 5 Qualification in Business Coaching and Mentoring is comprised of six modules, covering the following: Module OneIntroduction 1.1) Explore the myths 1.2) What is coaching and mentoring? 1.3) What is business coaching? 1.4) Thoughts and perceptions 1.5) 7 competencies of a coach 1.6) Definitions - Mentoring / Consulting / Coaching / Therapy / Counseling Module TwoModels and Practice 2.1) The Wheel of Life 2.2) Johari's Window 2.3) KASH - Knowledge, Attitude, Skills, Habits of an effective coach 2.4) STAR / GROW model 2.5) Effective use of Paradigm cards 2.6) Practice and feedback Module ThreeBuilding the Relationship 3.1) Self-management 3.2) How motivation works 3.3) Personality & behavioural traits 3.4) Rapport and trust Module FourCommunication and Practice 4.1) Non-verbal communication 4.2) Effective communication 4.3) Questioning through 2nd/3rd/4th level questioning 4.4) Building a bank of coaching questions 4.5) Practice and feedback Module FiveStructure 5.1) Introduction 5.2) The coaching cycle 5.3) How to give feedback 5.4) The COMET model 5.5) Executive coaching 5.6) Psychometrics 5.7) Closing the coaching session Module SixWell-Formed Outcomes 6.1) Challenge and focus steps 6.2) Coaching goals 6.3) Establishing the gap analysis 6.4) Using diagnostic tools 6.5) SMART objectives 6.6) Designing & planning focus steps 6.7) Gaining commitment 6.8) Practice and feedback Who is it for? Business coaching is the skill to have in today's rapidly changing business climate. People and team development through business coaching is fast, efficient and cost effective, and will get you measurable results. The ILM Level 5 Qualifications in Business Coaching and Mentoring are highly accessible and have been designed for all tiers of director, management and supervisory level, or indeed anyone involved in people development. With a business-relevant, tried-and-tested approach, we encourage participants to bring live business issues and case histories with them on the course. Accreditation Upon completion of this programme all attendees will receive the 'ILM Endorsed Programme in Business Coaching & Mentoring' certificate. Participants will also be eligible to receive ILM letters after their name; either AMInstLM (Affiliate/Associate Member Institute Leadership & Management) or MInstLM (Member Institute Leadership & Management). As with all ILM Accredited Programmes, participants will need to complete the post-programme activity in order to achieve their full 'ILM Level 5 Certificate in Coaching and Mentoring in Management' certificate. These elements have been designed in order to show to the Institute of Leadership and Management (ILM) that you are able to put the skills and techniques learned on the programme into practice. Full support and guidance is provided for completing these final elements. Required Activities Pre-Course We ask you to come prepared with issues which you are currently experiencing that you would be happy to discuss and be coached on. We also send out a short document containing questions and exercises which will help our coaches understand you better and work with you in order to receive the best training. Post-Course To achieve this ILM qualification, participants will have to complete the following post-course activities: 3 x work-based assignments need to be completed within 1 year from attendance and registration. Embedded in the assignments, the Certificate will require delegates to complete 18 hours of coaching or mentoring activity with 2-3 people. The Diploma will require delegates to complete 54 hours of coaching or mentoring with 4-9 people. Tutor guided learning will take on the format of book and video reviews with ongoing tutor guidance and support via phone, Skype or face-to-face. Optional: Self-initiated 2 x 45 min executive coaching sessions per delegate to offer a coaching best practice view. Course Material Each participant will be issued with a workbook to assist them both during and after the course, which will contain information, guidance and forms to assist with the coaching sessions. Participants will also complete a Paradigm psychometric report and receive a year's membership with the Institute of Leadership & Management (ILM). In-House & Classroom Courses Available Online We have developed an alternative to traditional face-to-face training that continues to provide a full learning experience, and allows delegates to learn effectively whilst self-isolating from home. This is how it looks: Delegates booked on Classroom and In-House courses will continue to have access to their trainer online throughout the days that the course is booked to run. Prior to a delegate's course start date, they will be enrolled on our e-learning platform (in partnership with BCF Group) for the course they are booked on to. They will also be given contact information for their trainer, and details of how to access the online workshops. Delegates will not require any special IT equipment. A desktop computer, laptop, tablet, or a mobile phone with internet and audio capability is all that is required. Delegates taking ILM Qualifications will then proceed to the book review, video review and work based assignments with 12 months tutor support as appropriate, and in line with our previous arrangements. We hope you agree that this blended learning experience represents the safest way to continue supporting our clients and delegates during the Coronavirus disruption. Scheduled Courses Classroom Course - Nottingham (NG12 4DG) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. In addition to the 2 days in the classroom, delegates will need to undertake self-directed learning and 3 work-based assignments. As a guide, this is estimated to take 3 hours per week for 12 months. Diploma: £2,195 + vat | Certificate: £1,895 + vat 03-04 October 2023 22-23 February 2024 Classroom Course - Reading (RG41 5QS) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. In addition to the 2 days in the classroom, delegates will need to undertake self-directed learning and 3 work-based assignments. As a guide, this is estimated to take 3 hours per week for 12 months. Diploma: £2,195 + vat | Certificate: £1,895 + vat 14-15 September 2023 14-15 December 2023 14-15 March 2024 Zoom™ Course Attending a course via Zoom videoconferencing gives you all of the benefits of classroom training without the need to leave your home or office. You still benefit from a real tutor facilitating the programme, and the content is exactly the same. The only difference is that we split the course into four half-day sessions to make it easier on your eyes! Diploma: £1,795 + vat | Certificate: £1,495 + vat September 2023 - 25th Sep (morning), 25th Sep (afternoon), 26th Sep (morning), 26th Sep (afternoon) November 2023 - 6th Nov (morning), 6th Nov (afternoon), 7th Nov (morning), 7th Nov (afternoon) January 2024 - 11th Jan (morning), 11th Jan (afternoon), 12th Jan (morning), 12th Jan (afternoon) March 2024 - 11th Mar (morning), 11th Mar (afternoon), 12th Mar (morning), 12th Mar (afternoon) May 2024 - 14th May (morning), 14th May (afternoon), 15th May (morning), 15th May (afternoon) July 2024 - 9th Jul (morning), 9th Jul (afternoon), 10th Jul (morning), 10th Jul (afternoon Dickson Training Ltd Founded in 1985 in Yorkshire, we have built an impressive and loyal client base. Our partnerships are built by consistently delivering outstanding development solutions and working in close collaboration with our clients, resulting in us becoming a leading UK and international training provider.

ILM Level 5 Qualifications in Business Coaching and Mentoring
Delivered in person or Online + more
£1,495 to £2,195

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered Online
£595

Mental Health and Learning Disability

By BBO Training

Introduction to Mental Health and Learning Disability in Primary Care (2-Day Course)This course is designed for Nurse Associates, Practice Nurses, Nurse Practitioners (NP's), Emergency Nurse Practitioners (ENP's), Paramedics, and Pharmacists who aim to enhance their knowledge and skills in mental health and learning disability care within the primary care setting.Day 1: Mental HealthLearning Objectives:1. Understand the concept of mental health and its importance in overall well-being.2. Identify common mental health disorders, their signs, symptoms, and risk factors.3. Explore different approaches to mental health assessment and diagnosis.4. Learn evidence-based interventions for various mental health conditions.5. Develop effective communication skills when interacting with individuals experiencing mental health challenges.6. Gain knowledge of available resources and support systems for mental health.Introduction to Performing Annual Reviews for Mental Health Patients:- Understand the significance of performing annual reviews for individuals with mental health conditions.- Explore the assessment tools and methods required for annual reviews in mental health.- Begin to develop skills in conducting annual reviews for mental health patients.Day 2: Learning DisabilitiesLearning Objectives:1. Define learning disabilities and recognize their impact on individuals' lives.2. Identify common types of learning disabilities, their characteristics, and associated challenges.3. Understand the importance of early detection and screening for learning disabilities.4. Learn strategies for supporting individuals with learning disabilities in various settings.5. Explore the rights and legislation related to individuals with learning disabilities.6. Enhance communication and collaboration skills when working with individuals with learning disabilities.Introduction to Performing Annual Reviews for Learning Disability Patients:- Understand the significance of performing annual reviews for individuals with learning disabilities.- Learn the specific assessment tools and methods required for annual reviews in learning disabilities.- Begin to develop skills in conducting annual reviews for learning disability patients.Join us for this informative and interactive 2-day course via Zoom, led by Dr. Tamara Cunningham, and equip yourself with the knowledge and skills necessary to provide comprehensive care for individuals with mental health and learning disability conditions in a primary care setting.

Mental Health and Learning Disability
Delivered OnlineFlexible Dates
£276

MS-700T00 Managing Microsoft Teams

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. A Microsoft Teams administrator must be able to plan, deploy, and manage teams, chat, apps, channels, meetings, audio/video conferencing, live events, calling, and Teams certified devices. A Microsoft Teams administrator has experience integrating Microsoft Teams with SharePoint, OneDrive, Exchange, Microsoft 365 Groups, and other Microsoft, third-party, and custom apps. A Microsoft Teams administrator understands and collaborates with other workloads and roles, such as Network, Voice, Identity, Access, Devices, Licensing, Security, Compliance, Information management, and User Adoption. Overview What is Microsoft Teams and how the components work together How to implement Governance, Security and Compliance for Microsoft Teams How to prepare an organizations environment for a Microsoft Teams deployment How to deploy and manage teams How to manage collaboration and communication experiences in Microsoft Teams Techniques to manage and troubleshoot communication in Microsoft Teams The Managing Microsoft Teams course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. In this course, you will learn about various Teams management tools, security and compliance feature for Teams, network requirement for Teams deployment as well as different Teams settings and policies for managing collaboration and communication experience in Teams. Prerequisites A proficient understanding of basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices, including using PowerShell. 1 - Explore Microsoft Teams Explore capabilities in Microsoft Teams Explore Microsoft Teams integration with Microsoft 365 Explore Microsoft Teams integration with Microsoft Power Platform Illustrate Microsoft Teams architecture Describe Microsoft Teams with Microsoft 365 Groups Describe Microsoft Teams with SharePoint and OneDrive Describe Microsoft Teams with Exchange Understand Microsoft Teams certified solutions 2 - Plan and deploy Microsoft Teams Designate Teams admin roles Understand Teams management tools Plan for Teams rollout Plan for Teams adoption Plan for Teams licensing Deploy Microsoft Teams clients 3 - Implement lifecycle management and governance for Microsoft Teams Plan for lifecycle management Plan for Teams governance Manage Microsoft 365 Groups creation Configure Microsoft 365 Groups expiration policy Configure Microsoft 365 Groups naming policy Plan policy assignment for users and groups Create and manage policy packages Manage Teams preview features using Teams update policies Create and manage teams templates and template policies 4 - Monitor your Microsoft Teams environment Monitor Microsoft Teams usage reports Monitor Microsoft 365 usage reports Interpret Microsoft Adoption Score Manage user access with Azure Active Directory access reviews Monitor the Microsoft 365 network connectivity dashboard Manage Teams notifications and alerts Manage feedback policies 5 - Manage access for external users Understand features in Azure Active Directory Work with external users in Microsoft Teams Manage access for external users Manage external collaboration in Azure AD Manage external collaboration in Microsoft 365 Manage external access in Microsoft Teams Manage guest access in Microsoft Teams Manage file sharing in SharePoint and OneDrive 6 - Implement security for Microsoft Teams Configure conditional access and multifactor authentication for Microsoft Teams Configure Safe Attachments for Microsoft Teams Configure Safe Links for Microsoft Teams Examine the Defender for Cloud Apps Monitor security reports for Microsoft Teams Plan and configure enhanced encryption policies 7 - Implement compliance for Microsoft Teams Create and manage sensitivity labels Create and manage retention policies Create and manage Data Loss Prevention policies Deploy communication compliance Enable scoped directory search Create information barrier policy Create security and compliance alerts for Microsoft Teams 8 - Plan and configure network settings for Microsoft Teams Examine network requirements for Microsoft Teams Plan for network deployment using Network Planner Configure network ports and protocols for Microsoft Teams Implement Quality of Service Configure reporting labels for location-enhanced Call Analytics reports Configure tenant data for Call Quality Dashboard reports Assess network readiness Manage network topology 9 - Create and manage teams Create teams Create a team from existing resources Plan and create org-wide teams Manage teams Manage users in a team Configure dynamic membership Archive restore and delete a team 10 - Manage collaboration experiences for chat and channels Create and manage channels in a team Create and manage Teams policies for channels Configure teams settings Create and manage messaging policies Manage channel moderation Manage access to channels 11 - Manage apps for Microsoft Teams Explore apps in Microsoft Teams Describe admin settings for Teams apps Manage access to Teams apps at the organization level Create and manage app permission policies Create and manage app setup policies Manage permissions and consent for Teams apps Plan and configure connectors Manage custom apps uploads Publish custom apps to Microsoft Teams Manage purchasing of apps in the Microsoft Teams app store Customize the organization's app store Customize the branded experience of an app 12 - Introduction to Teams meetings and calling Overview of Teams meetings and events Overview of Teams Phone Overview of auto attendants and call queues Overview of Teams devices 13 - Manage meetings and events experiences Explore meetings and events in Microsoft Teams Configure meeting settings Create and manage meeting policies Configure audio conferencing Create and manage meeting templates and template policies Create and manage meetings customization policies Configure live events settings Create and manage live events policies Examine live events across Microsoft 365 14 - Plan for Microsoft Teams Rooms and Surface Hub Determine license requirements for Microsoft Teams Rooms and shared devices Understand differences between Microsoft Teams Rooms on Android and Windows Understand Microsoft Teams Rooms on Surface Hub 2S Understand and plan Teams Room accessories, components, and peripherals Understand Teams Rooms management options 15 - Configure, deploy, and manage Teams devices Manage Microsoft Teams Phones Manage Microsoft Teams Room Systems Microsoft Teams Rooms management options Manage Surface Hub 2S devices Configure Microsoft Teams SIP gateway Manage Microsoft Teams displays Remote provisioning and sign in for Teams Phones Update Microsoft Teams devices remotely Manage Microsoft Teams device tags 16 - Plan for Teams Phone Plan to deploy Teams Phone Plan for Teams Phone PSTN connectivity Determine license requirements Plan for Teams Phone devices Plan and design Teams Phone features Plan for voicemail 17 - Configure and deploy Teams Phone Configure emergency calling for Teams Calling Plans Manage and configure Microsoft PSTN numbers Configure Operator Connect and Teams Phone Mobile Configure Teams Phone policies Create and manage Teams policies Configure Audio Conferencing 18 - Configure and manage voice users Enable users for Teams Phone Enable users for Direct Routing with Teams Phone Enable additional calling features for Teams Phone Enable users for Teams Phone Mobile 19 - Configure auto attendants and call queues Design call flows for auto attendants and call queues Configure auto attendants and call queues Deploy a channel-based call queue Configure resource accounts Configure Microsoft 365 groups for voicemail Interpret call queue conference modes Interpret call queue routing methods Configure holidays for auto attendants and call queues Configure custom music on hold 20 - Troubleshoot audio, video, and client issues Troubleshoot Teams Collect and identify logs Clear Microsoft Teams client cache Identify issues with call analytics Identify issues with Call Quality Dashboard Use Power BI to analyze Call Quality Dashboard data Identify issues with the Direct Routing Health Dashboard Additional course details: Nexus Humans MS-700T00 Managing Microsoft Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-700T00 Managing Microsoft Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-700T00 Managing Microsoft Teams
Delivered Online
£2,380

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Scrum Product Owner Workshop: In-House Training

By IIL Europe Ltd

Scrum Product Owner Workshop: In-House Training The Product Owner is responsible for maximizing the value of the product and the work of the Development Team. The Product Owner must be knowledgeable, available, and empowered to make decisions quickly in order for an Agile project to be successful. The Product Owner's key accountability is the Product Backlog. Managing, maintaining, and evolving the Product Backlog involves: Establishing a clear Vision that engages the Development Team and stakeholders Clearly expressing Product Backlog items Ordering the items in the Product Backlog to best achieve the Vision and goals Ensuring that the Product Backlog is visible, transparent, and clear to all Working with the Development Team throughout the project to create a product that fits the customer's needs The overall course goal is to support you in becoming an effective Product Owner. What you will Learn You'll learn how to: Differentiate between poor, good, and great Product Owner attributes, and their impact on the team, product, stakeholders, and the organization Engage your stakeholders by knowing your customers and market Develop an effective and value-driven Product Backlog Evaluate the Product Owner's role in Scrum's 5 events and team engagement Foundation Concepts Agile foundation Product owner role Product Ownership Product ownership Project vision Understanding your customers and market Personas Stakeholder management and engagement The Product Backlog Epics and user stories Preparing user stories for a sprint The product backlog Visualizing the product backlog Product backlog prioritization Technical debt Sprint Planning and Delivery Sprint planning The sprint Sprint Reviews, Retrospectives, and Closing Sprint reviews Key agile patterns Retrospectives Closing the project

Scrum Product Owner Workshop: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495